npub1gk…utj70 on Nostr: Today, 16 years ago, Debian published a security advisory announcing CVE-2008-0166, a ...
Today, 16 years ago, Debian published a security advisory announcing CVE-2008-0166, a severe bug in their OpenSSL package that effectively broke the random number generator and limited the key space to a few ten thousand keys. The vulnerability affected Debian+Ubuntu between 2006 and 2008. In 2007, an email signature system called DKIM was introduced. Is it possible that people configured DKIM in 2007, never changed their key, and are still vulnerable to CVE-2008-0166?
https://16years.secvuln.info/Published at
2024-05-12 08:24:26Event JSON
{
"id": "6b7e5ddd225cf9f81826292f96ba7d1c0269d5c62786b00eb1889e0fe2c0229a",
"pubkey": "45be03643b1b47c02f8c4bf8932009f10ffaead3770fb1a9a559f2155450723b",
"created_at": 1715502266,
"kind": 1,
"tags": [
[
"proxy",
"https://mastodon.social/users/hanno/statuses/112427156548148984",
"activitypub"
]
],
"content": "Today, 16 years ago, Debian published a security advisory announcing CVE-2008-0166, a severe bug in their OpenSSL package that effectively broke the random number generator and limited the key space to a few ten thousand keys. The vulnerability affected Debian+Ubuntu between 2006 and 2008. In 2007, an email signature system called DKIM was introduced. Is it possible that people configured DKIM in 2007, never changed their key, and are still vulnerable to CVE-2008-0166? https://16years.secvuln.info/",
"sig": "d77a9965284864ae4faef190056a6c34dca439ba56ec009bbd53d0eb277841ccd93bbcef0d1203f38a80157d88ca1ee5a46cf5ab6e085f7dadc04ef864467b4c"
}